Service Operations
Stage
4
This refers to the process of allowing access to authorized users and prevent access by non-authorized users. It works closely with Information Security Management.
Access Management Activites
- Request Access - Typically comes from the service desk via a service request (in Service Operations) or from a request for change (in Service Transition).
- Verification - Different levels of access may include different amounts of verification.
- Providing Rights
- Monitoring Identity Status
- Logging and Tracking Access
- Removing or Restricting Rights